Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Sign up!
EnGarde Community
What is the most important Linux security technology?
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Latest Newsletters
Linux Advisory Watch: March 27th, 2015
Linux Security Week: March 23rd, 2015
LinuxSecurity Newsletters
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

Mandriva: Updated binutils packages fix vulnerabilities Print E-mail
User Rating:      How can I rate this item?
Posted by Benjamin D. Thomas   
Mandrake Integer overflows in various applications in the binutils package may allow attackers to execute arbitrary code via a carefully crafted object file. The updated packages have been patched to help address these problems.
 Mandriva Linux Security Advisory                         MDKSA-2005:215
 Package : binutils
 Date    : November 23, 2005
 Affected: 10.1, 10.2, Corporate 2.1, Corporate 3.0,
           Multi Network Firewall 2.0
 Problem Description:
 Integer overflows in various applications in the binutils package 
 may allow attackers to execute arbitrary code via a carefully crafted 
 object file. 
 The updated packages have been patched to help address these problems.

 Updated Packages:
 Mandriva Linux 10.1:
 708b5397a0f8d66ff7825a87109cee13  10.1/RPMS/binutils-
 cfe970075dabce10d2ea4d8e4fa67aaf  10.1/RPMS/libbinutils2-
 2aa1168d9d0b6c603da3acbdea22fc9c  10.1/RPMS/libbinutils2-devel-
 1f5e832b6ed31c56b3def12e375610da  10.1/SRPMS/binutils-

 Mandriva Linux 10.1/X86_64:
 e700db501ac6f8f9b2d417c080ab5eea  x86_64/10.1/RPMS/binutils-
 6abac53d844407ef121691b636b20e1b  x86_64/10.1/RPMS/lib64binutils2-
 b6f861d559d57c8c5a92e777815e4c73  x86_64/10.1/RPMS/lib64binutils2-devel-
 1f5e832b6ed31c56b3def12e375610da  x86_64/10.1/SRPMS/binutils-

 Mandriva Linux 10.2:
 c2a2cfc84982642148278a522ae20398  10.2/RPMS/binutils-
 e026dde17010169f948ffcc7f0f84196  10.2/RPMS/libbinutils2-
 2d0f051e47a0bd56f6472a182d552064  10.2/RPMS/libbinutils2-devel-
 f22b295f02e30b0eb4d12411621c0404  10.2/SRPMS/binutils-

 Mandriva Linux 10.2/X86_64:
 dc5b9b89c6fb480e4e22cd78aa377a54  x86_64/10.2/RPMS/binutils-
 29fbcbe86219392c6e821d8551f918b0  x86_64/10.2/RPMS/lib64binutils2-
 5cab7d1ab727c5965faf90c14c16ab88  x86_64/10.2/RPMS/lib64binutils2-devel-
 f22b295f02e30b0eb4d12411621c0404  x86_64/10.2/SRPMS/binutils-

 Corporate Server 2.1:
 4fc16a664f25b5b7ce57938d5b9aa6e1  corporate/2.1/RPMS/binutils-
 18c1b567a556d8f3f8e8333dca45c971  corporate/2.1/RPMS/libbinutils2-
 c08be5df6b56231ca1c4436a805d6b81  corporate/2.1/RPMS/libbinutils2-devel-
 dbc46ffe4e6f710d355796211bdff83c  corporate/2.1/SRPMS/binutils-

 Corporate Server 2.1/X86_64:
 1561acb857e03d7a167af0945efe7650  x86_64/corporate/2.1/RPMS/binutils-
 e683343df371de35d026cbdba7dbc898  x86_64/corporate/2.1/RPMS/libbinutils2-
 9c53bf3a8c5a303c2f97d06216dbf30c  x86_64/corporate/2.1/RPMS/libbinutils2-devel-
 dbc46ffe4e6f710d355796211bdff83c  x86_64/corporate/2.1/SRPMS/binutils-

 Corporate 3.0:
 ef926843f1e4141cecbb5a77015d5092  corporate/3.0/RPMS/binutils-
 494a84d96695e9b3d5fe98dec372cb56  corporate/3.0/RPMS/libbinutils2-
 0deb09a9ee7a41172fbf242cf40b9f10  corporate/3.0/RPMS/libbinutils2-devel-
 e57a1ef31c7d86749bb93f2c5632c168  corporate/3.0/SRPMS/binutils-

 Corporate 3.0/X86_64:
 c999b0c9026df1c47e2ecfafb3396973  x86_64/corporate/3.0/RPMS/binutils-
 b2eacb13d69dc3a3f24ba0d466a0a7d2  x86_64/corporate/3.0/RPMS/lib64binutils2-
 603859440efa6b87a0b66954e01977b9  x86_64/corporate/3.0/RPMS/lib64binutils2-devel-
 e57a1ef31c7d86749bb93f2c5632c168  x86_64/corporate/3.0/SRPMS/binutils-

 Multi Network Firewall 2.0:
 9eab0b74b586e443a0e533af8cca5fa4  mnf/2.0/RPMS/binutils-
 93047308f094f014b37aee12534c43df  mnf/2.0/RPMS/libbinutils2-
 0ccb5c7d9a158dbce80de957aa7b0b04  mnf/2.0/SRPMS/binutils-

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver 0x22458A98

 You can view other update advisories for Mandriva Linux at:

 If you want to report vulnerabilities, please contact


 Type Bits/KeyID     Date       User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
< Prev   Next >


Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Weekend Edition
FBI Quietly Removes Recommendation To Encrypt Your Phone
And the prize for LEAST SECURE BROWSER goes to ... Chrome!
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2015 Guardian Digital, Inc. All rights reserved.